Zero- Day Exploit Firewall Security Best Practices Security Breach Response Encryption Cyber Hygiene Secure Socket Layer (SSL) Biometric Authentication Data Loss Prevention (DLP) Multi-Factor Authentication (MFA) Ransomware Two-Factor Authentication (2FA) Password Strength Cyber Threat Vulnerability Denial of Service (DoS) Phishing Data Breach Intrusion Detection System (IDS) Intrusion Prevention System (IPS) Digital Footprint Incident Response Patch Management Social Engineering Security Incident Security Policy Access Control Penetration Testing Security Awareness Training Authentication Security Awareness Month Security Patch Network Monitoring Phishing Awareness Firewall Configuration Network Security Security Audit Malware Information Security Endpoint Security Zero- Day Exploit Firewall Security Best Practices Security Breach Response Encryption Cyber Hygiene Secure Socket Layer (SSL) Biometric Authentication Data Loss Prevention (DLP) Multi-Factor Authentication (MFA) Ransomware Two-Factor Authentication (2FA) Password Strength Cyber Threat Vulnerability Denial of Service (DoS) Phishing Data Breach Intrusion Detection System (IDS) Intrusion Prevention System (IPS) Digital Footprint Incident Response Patch Management Social Engineering Security Incident Security Policy Access Control Penetration Testing Security Awareness Training Authentication Security Awareness Month Security Patch Network Monitoring Phishing Awareness Firewall Configuration Network Security Security Audit Malware Information Security Endpoint Security
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Zero-Day Exploit
Firewall
Security Best Practices
Security Breach Response
Encryption
Cyber Hygiene
Secure Socket Layer (SSL)
Biometric Authentication
Data Loss Prevention (DLP)
Multi-Factor Authentication (MFA)
Ransomware
Two-Factor Authentication (2FA)
Password Strength
Cyber Threat
Vulnerability
Denial of Service (DoS)
Phishing
Data Breach
Intrusion Detection System (IDS)
Intrusion Prevention System (IPS)
Digital Footprint
Incident Response
Patch Management
Social Engineering
Security Incident
Security Policy
Access Control
Penetration Testing
Security Awareness Training
Authentication
Security Awareness Month
Security Patch
Network Monitoring
Phishing Awareness
Firewall Configuration
Network Security
Security Audit
Malware
Information Security
Endpoint Security